Ministry of Higher and Secondary Specialised Education of the Republic of Uzbekistan State World Languages University Republican Scientific – Practical Centre of Developing Innovational Methods of Foregn Languages Authors


Read the text, choose and circle the appropriate heading for each paragraph. 9



Download 39,21 Mb.
Pdf ko'rish
bet19/92
Sana28.07.2021
Hajmi39,21 Mb.
#130939
1   ...   15   16   17   18   19   20   21   22   ...   92
Bog'liq
student-1

10

Read the text, choose and circle the appropriate heading for each paragraph.



9

___________________________________

a.  As there are advantages and disadvantages of 

every invention, sphere, and revolution, speeding 

of information also has two sides. When something 

happens or is discovered or invented in one corner 

of our planet, the whole world learns about it 

immediately. But there is a notion of information 

attack. It can be understood in two ways; the first 

interpretation is “attack to information” and the 

second is “attack somebody or something with 

the help of information”. Both of them are more 

dangerous showing catastrophic consequences 

than any type of attack with weapons or tanks. 

___________________________________

b.  Attack to information is penetrating into ones 

PC and monitoring, snooping, spying, stealing 

Work in pairs. Read the statement and discuss it.



8

Ideological attack is more powerful than military assault

information and so on. The worst site is that is 

easy to hack (steal) your information virtually and 

even you do not know when, how and who hacked 

and usually you cannot mind the event or object to. 

But Spying is sometimes legal, because you click 

on “I accept” in the licence agreements written in 

small prints even not reading. 

___________________________________

c.  Information threat in business purposes also 

exists; it can be understood as attack to intellectual 

property. What is an nintellectual property? Simply, 

we can say that it is someone else’s intellectual 

working results such as musical, literary, and 

artistic works; discoveries and inventions; and 

words, phrases, symbols (trademarks), and designs. 

But owners usually suffer from not being able to 

prove that idea was originally created by them. 

File swapping with your friend is also against law.

___________________________________ 

d.  Attack with the help of information is making 

someone or group of people accept someone’s 

ideas, set of beliefs or ideological views; especially 

it is made with pressure in different ways. Those 

ways may be encouraging, persuading or even 

financially supporting. 


Download 39,21 Mb.

Do'stlaringiz bilan baham:
1   ...   15   16   17   18   19   20   21   22   ...   92




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish